Yinhao Xiao
Yinhao Xiao
Guangdong University of Finance and Economics
Verified email at - Homepage
Cited by
Cited by
Edge computing security: State of the art and challenges
Y Xiao, Y Jia, C Liu, X Cheng, J Yu, W Lv
Proceedings of the IEEE 107 (8), 1608-1631, 2019
NormaChain: A blockchain-based normalized autonomous transaction settlement system for IoT-based E-commerce
C Liu, Y Xiao, V Javangula, Q Hu, S Wang, X Cheng
IEEE Internet of Things Journal 6 (3), 4680-4693, 2018
A novel graph-based mechanism for identifying traffic vulnerabilities in smart home IoT
Y Jia, Y Xiao, J Yu, X Cheng, Z Liang, Z Wan
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1493-1501, 2018
BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT
S Liu, J Yu, Y Xiao, Z Wan, S Wang, B Yan
IEEE Internet of Things Journal 7 (9), 7851-7867, 2020
I can see your brain: Investigating home-use electroencephalography system security
Y Xiao, Y Jia, X Cheng, J Yu, Z Liang, Z Tian
IEEE Internet of Things Journal 6 (4), 6681-6691, 2019
Image and attribute based convolutional neural network inference attacks in social networks
B Mei, Y Xiao, R Li, H Li, X Cheng, Y Sun
IEEE Transactions on Network Science and Engineering 7 (2), 869-879, 2018
Detecting malicious behaviors in javascript applications
J Mao, J Bian, G Bai, R Wang, Y Chen, Y Xiao, Z Liang
IEEE Access 6, 12284-12294, 2018
LH-ABSC: a lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT
J Yu, S Liu, S Wang, Y Xiao, B Yan
IEEE Internet of Things Journal 7 (9), 7949-7966, 2020
Queuing without patience: A novel transaction selection mechanism in blockchain for iot enhancement
H Shi, S Wang, Y Xiao
IEEE Internet of Things Journal 7 (9), 7941-7948, 2020
HomeShield: a credential-less authentication framework for smart home systems
Y Xiao, Y Jia, C Liu, A Alrawais, M Rekik, Z Shan
IEEE Internet of Things Journal 7 (9), 7903-7918, 2020
Tokoin: a coin-based accountable access control scheme for Internet of Things
C Liu, M Xu, H Guo, X Cheng, Y Xiao, D Yu, B Gong, A Yerukhimovich, ...
arXiv preprint arXiv:2011.04919, 2020
Design of cloud computing task offloading algorithm based on dynamic multi-objective evolution
S Hu, Y Xiao
Future Generation Computer Systems 122, 144-148, 2021
Inference attacks based on neural networks in social networks
B Mei, Y Xiao, H Li, X Cheng, Y Sun
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and …, 2017
Privilege leakage and information stealing through the android task mechanism
Y Xiao, G Bai, J Mao, Z Liang, W Cheng
2017 IEEE Symposium on Privacy-Aware Computing (PAC), 152-163, 2017
Cryptographic algorithms for privacy-preserving online applications
R Li, Y Xiao, C Zhang, T Song, C Hu
Mathematical Foundations of Computing 1 (4), 311, 2018
Correlated participation decision making for federated edge learning
Q Hu, F Li, X Zou, Y Xiao
GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020
A correlated equilibrium based transaction pricing mechanism in blockchain
Q Hu, Y Nigam, Z Wang, Y Wang, Y Xiao
2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-7, 2020
A function-level behavior model for anomalous behavior detection in hybrid mobile applications
J Mao, R Wang, Y Chen, Y Xiao, Y Jia, Z Liang
2016 International Conference on Identification, Information and Knowledge …, 2016
I know your social network accounts: A novel attack architecture for device-identity association
Y Xiao, Y Jia, X Cheng, S Wang, J Mao, Z Liang
IEEE Transactions on Dependable and Secure Computing, 2022
CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems
Y Xiao, Y Jia, Q Hu, X Cheng, B Gong, J Yu
IEEE Transactions on Dependable and Secure Computing, 2022
The system can't perform the operation now. Try again later.
Articles 1–20